Sciweavers

8655 search results - page 95 / 1731
» Challenges for Trusted Computing
Sort
View
IDTRUST
2010
ACM
14 years 3 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
GCC
2005
Springer
14 years 2 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
CSREASAM
2006
13 years 10 months ago
Modeling Role-based Trust and Authority in Open Environments
Trust and authority are essential components that must be factored in designing and implementing a distributed access control mechanism for open environments. This paper presents ...
Dongwan Shin
ICPR
2002
IEEE
14 years 10 months ago
The Gait Identification Challenge Problem: Data Sets and Baseline Algorithm
P. Jonathon Phillips, Sudeep Sarkar, Isidro Robled...
CHI
2006
ACM
14 years 9 months ago
Investigating new user experience challenges in iTV: mobility & sociability
Anxo Cereijo Roibás, David Geerts, Elizabeth Furt...